Author of the publication

Towards Practical Automatic Generation of Multipath Vulnerability Signatures

, , , and . CMU-CS-07-150. School of Computer Science, Carnegie Mellon University, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms., , , , , and . ACM Conference on Computer and Communications Security, page 13-24. ACM, (2013)The sybil attack in sensor networks: analysis & defenses., , , and . IPSN, page 259-268. ACM, (2004)Replayer: automatic protocol replay by binary analysis., , , and . CCS, page 311-321. ACM, (2006)Sting: An End-to-End Self-Healing System for Defending against Internet Worms., , and . Malware Detection, volume 27 of Advances in Information Security, Springer, (2007)Towards Practical Automatic Generation of Multipath Vulnerability Signatures, , , and . CMU-CS-07-150. School of Computer Science, Carnegie Mellon University, (2007)ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets., , , and . Security Protocols Workshop, volume 8263 of Lecture Notes in Computer Science, page 94-114. Springer, (2013)Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?, , , , and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 159-178. Springer, (2012)Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation., , , and . USENIX Security Symposium, USENIX Association, (2007)MiniBox: A Two-Way Sandbox for x86 Native Code., , , , , and . USENIX Annual Technical Conference, page 409-420. USENIX Association, (2014)Paragraph: Thwarting Signature Learning by Training Maliciously., , and . RAID, volume 4219 of Lecture Notes in Computer Science, page 81-105. Springer, (2006)